The Symantec Connect Blog has details on Symantec's discovery of the credentials of 44 million stolen online gaming accounts, saying that the accounts were being validated by an automated program to determine which of these could be sold. They say: "This particular database server we uncovered seems very much to be the heart of the operation—part of a distributed password checker aimed at Chinese gaming websites." They say there are credentials for at least 18 gaming websites in the database, an inventory including about 210,000 World of Warcraft accounts, 60,000 Aion accounts, 2 million PlayNC accounts, and 16 million Wayi Entertainment accounts. Regardless of whether Chinese sites were the target, they conclude with this advice: "As always, Symantec recommends that you keep your definitions up to date in order to ensure protection against new threats. As an added precaution, if you are in possession of a gaming account from one of the websites listed above, an update of your password would not go amiss." Thanks Network World.

Those that aren't using Kaspersky or NOD32 v4.0 with MalwareBytes real time protection are exposed. Plus being behind a firewall helps some and using other products like Sandboxie and VMWare virtualization to test downloaded apps.

If the above confuses you, consider yourself exposed and most likely compromised.